• Title/Summary/Keyword: False communication

Search Result 283, Processing Time 0.026 seconds

A Study on the protection of false alarm in the UV/IR flame detector (불꽃 감지기에서 오동작 방지에 관한 연구)

  • Lim, Byung-Hyun;Park, Sung-Jin;Lim, Jong-Yeon;Hwang, Jong-Sun;Kim, Young-Min
    • Proceedings of the KIEE Conference
    • /
    • 2001.04a
    • /
    • pp.209-212
    • /
    • 2001
  • A flame detector responds either to radiant energy visible to the human eye or outside the range of human vision. Such a detector is sensitive to glowing embers, coals, or flames which radiate energy of sufficient intensity and spectral quality to actuate the alarm. An infra-red detectors can respond to the total IR component of the flame alone or in combination with flame flicker in the frequency range of 5 to 30 Hz. A major problem in the use of infrared detectors receiving total IR radiation is the possible interference of solar radiation in the infrared region. When detectors are located in places shielded from the sun, such as vaults, filtering or shielding the unit from the sun's rays is unnecessary. In this study, we proposed method for redue a false alarm with using filtering & sensor technology for distinguish of causes of raise a false alarm and pure flame.

  • PDF

A Study on Decrease of False Positive Rate of Detection against Sniffing Attack over Switched Network (Switched Network 상에서 스니핑 공격 탐지에 있어서의 오탐율 감소를 위한 연구)

  • Lim, Jung-Muk;Yang, Jin-Seok;Han, Young-Ju;Lee, Eun-Sun;Lim, Hyung-Jin;Chung, Tai-Myung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1083-1086
    • /
    • 2004
  • Switched Network는 Shared Network 에 비해서 스니핑에 안전하다. 하지만 비교우위일뿐 절대적으로 스니핑에 안전한 것은 아니다. 이미 Switched Network 상에서 스니핑을 할 수 있는 공격툴들이 많이 소개되어 있다. 본 논문에서는 Switched Network 상에서 ARP(Address Resolution Protocol) 스푸핑을 통한 ARP 캐시 오염을 통하여 스니핑이 가능한 시나리오를 기술한다. 이러한 시나리오를 탐지하기 위한 기존의 방법은 DHCP와 같은 동적인 환경이 포함된 경우 False Positive 를 자주 발생시키기 때문에 문제가 된다. 여기에서는 이러한 False Positive를 줄인 탐지 방법을 제시하고자 한다.

  • PDF

An \alpha$-trimmed mean orientation extraction algorithm which is robust to scarred fingerprint (손상된 지문에 강건한 \alpha$-trimmed mean 방향성 추출 알고리즘)

  • 신종욱;윤병우;송종관
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.854-860
    • /
    • 2004
  • The result of fingerprint matching is different as the quality or the state of input fingerprint image. We can extract the false direction information when the quality of fingerprint is degraded by the noise or the scars of the ridges. The information of the direction is very important for the elimination of the false minutia, the measurement of the ridge distance, matching, finding of cores and deltas. We need the method which can compensate or correct the false information of directions because the false directions include serious errors in the fingerprint recognition. We propose a method which can compensate or correct the false direction of fingerprint with a \alpha$-trimmed mean filter followed by LPF to reconstruct the false direction information when fingerprints are corrupted by scars.

The Study of Improve Safety for Signaling System using Communication (통신에 의한 신호시스템의 안전성 확보에 대한 연구)

  • 백종현;한성호;안태기;온정근
    • Proceedings of the KSR Conference
    • /
    • 1999.05a
    • /
    • pp.307-314
    • /
    • 1999
  • The potential use of ranging sensors for reducing the occurrence of accidents in real environment is explored by many companies and laboratories. Most of the sensors under investigation utilize the FMCW(Frequency Modulated Continuous Wave) waveforms. The automotive environment presents to the FMCW radar sensor a multitude of moving and fixed targets and the sensor must detect and track only the targets which may pose a threat of collision or passengers accident. The sensor must function accurately in the presence of background echoes generated by moving and fixed targets, ground reflections, atmospheric noises, including rains, fog, and, snow and noise generated within the receiver. False detection of the desired target in this environment may issue false alarms. That may be dangerous to the passenger and the vehicle. A high false alarm rate is totally unacceptable. The false alarm mechanism consists of noise peaks, crossing the threshold and the undesired response of the system to off lane targets which are not potentially hazardous to the radar equipped vehicle. This paper presents an improve technique safety performance for driver-less operation using FMCW radar sensors.

  • PDF

The Study of Improved Safety of Signalling System using Communication (통신에 의한 신호시스템의 안전성 확보에 관한 연구)

  • Baek, Jong-Hyen;Wang, Jong-Bae;Byun, Yeun-Sub;Park, Hyun-Jun;Han, Young-Jae;Kim, Kil-Dong
    • Proceedings of the KIEE Conference
    • /
    • 2000.07b
    • /
    • pp.1368-1370
    • /
    • 2000
  • The automotive environment presents to the FMCW radar sensor a multitude of moving and fixed targets and the sensor must detect and track only the targets which may pose a threat of collision or passengers accident. The sensor must function accurately in the presence of background echoes generated by moving and fixed targets, ground reflections, atmospheric noises, including rains, fog, and, snow and noise generated within the receiver. False detection of the desired target in this environment may issue false alarms. That may be dangerous to the passenger and the vehicle. A high false alarm rate is totally unacceptable. The false alarm mechanism consists of noise peaks, crossing the threshold and the undesired response of the system to off lane targets which are not potentially hazardous to the radar equipped vehicle. This paper presents an improve technique safety performance for driver-less operation using FMCW radar sensors.

  • PDF

A study of Intrusion Detection System applying for association rule agent (연관규칙 에이전트를 적용한 침입 탐지 시스템에 관한 연구)

  • 박찬호;정종근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.5
    • /
    • pp.684-688
    • /
    • 2002
  • One of the Problems, which the Intrusion Detection System has, is a False Positive. This False make to low condition of the Intrusion Detection System. The cause of the False Positive is that the learning is not enough during audit data learning steps. Therefore, in this paper, 1 propose the method of the Intrusion Detection System that be learnt audit data to agent with association rule.

TOA Estimation Technique for IR-UWB Based on Homogeneity Test

  • Djeddou, Mustapha;Zeher, Hichem;Nekachtali, Younes;Drouiche, Karim
    • ETRI Journal
    • /
    • v.35 no.5
    • /
    • pp.757-766
    • /
    • 2013
  • This paper deals with the estimation of the time of arrival (TOA) of ultra-wideband signals under IEEE 802.15.4a channel models. The proposed approach is based on a randomness test and consists of determining whether an autoregressive (AR) process modeling an energy frame is random or not by using a distance to measure the randomness. The proposed method uses a threshold that is derived analytically according to a preset false alarm probability. To highlight the effectiveness of the developed approach, simulation setups as well as real data experiments are conducted to assess the performance of the new TOA estimation algorithm. Thereby, the proposed method is compared with the cell averaging constant false alarm rate technique, the threshold comparison algorithm, and the technique based on maximum energy selection with search back. The obtained results are promising, considering both simulations and collected real-life data.

Sybil Attack Detection with Energy Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 시빌 공격 탐지)

  • Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.115-120
    • /
    • 2013
  • There are lots of vulnerability and chance to be attacked in wireless sensor networks, which has many applications. Among those attacks, sybil attack is to generate a lot of false node and to inject false information into networks. When a user uses such false information without recognizing the attack, there might be a disaster. Although authentication method can be used to protect such attack, the method is not a good choice in wireless sensor networks, where sensor nodes have a limited battery and low power. In this paper, we propose a novel method to detect sybil attack with a little extra overhead. The proposed method use the characteristics that there is a weak connection between a group of normal nodes and a group of false nodes. In addition, the method uses energy aware routing based on random routing and adds a little information into the routing. Experimental results show that the proposed method detects false node by more than 90% probability with a little energy overhead.

Behavior based Routing Misbehavior Detection in Wireless Sensor Networks

  • Terence, Sebastian;Purushothaman, Geethanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5354-5369
    • /
    • 2019
  • Sensor networks are deployed in unheeded environment to monitor the situation. In view of the unheeded environment and by the nature of their communication channel sensor nodes are vulnerable to various attacks most commonly malicious packet dropping attacks namely blackhole, grayhole attack and sinkhole attack. In each of these attacks, the attackers capture the sensor nodes to inject fake details, to deceive other sensor nodes and to interrupt the network traffic by packet dropping. In all such attacks, the compromised node advertises itself with fake routing facts to draw its neighbor traffic and to plunge the data packets. False routing advertisement play vital role in deceiving genuine node in network. In this paper, behavior based routing misbehavior detection (BRMD) is designed in wireless sensor networks to detect false advertiser node in the network. Herein the sensor nodes are monitored by its neighbor. The node which attracts more neighbor traffic by fake routing advertisement and involves the malicious activities such as packet dropping, selective packet dropping and tampering data are detected by its various behaviors and isolated from the network. To estimate the effectiveness of the proposed technique, Network Simulator 2.34 is used. In addition packet delivery ratio, throughput and end-to-end delay of BRMD are compared with other existing routing protocols and as a consequence it is shown that BRMD performs better. The outcome also demonstrates that BRMD yields lesser false positive (less than 6%) and false negative (less than 4%) encountered in various attack detection.

True Position Determination Algorithm using Azimuth (방위를 이용한 진위 결정 알고리즘)

  • Youn, Jin-Young;Jeong, Seon-Jae;Yim, Jae-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.4
    • /
    • pp.691-699
    • /
    • 2018
  • Astronomical positioning has been carried out from the past by using Sextant. The St. Hilaire method was mainly used by Nautical Almanac and Sight Reduction Tables For Marine Navigation. In modern times, it has been able to use the LOP(Line of Position) method smoothly by combining with IT technology. However, in comparison with the past method, the LOP method always shows two positions, True Position and False Position, which must be distinguished by the navigator. Therefore, in this paper, we proposed a method of using the azimuth to remove the false position generated by the LOP method. In particular, the theoretical considerations using azimuth are presented in various ways, and the validity of the theoretical considerations is confirmed. Simulations are presented to confirm that the theoretical basis of the thesis is valid.